I have several Supermicro AOC-SIMSO+ IPMI cards that are having problems with Serial-over-LAN connections. When I try to connect to a SOL, I just get an Unexpected error and the program terminates. Everything else on the IPMIs appears to work. I can check status, change network settings, and power cycle the boxes. Here is the output of ipmitool with -vv.
sprt:~# ipmitool -vv -I lanplus -H 10.128.42.3 -U ADMIN -P ADMIN sol activate IPMI LAN host 10.128.42.3 port 623 >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x38 >> data : 0x8e 0x04 >> sending packet (23 bytes) 06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18 c8 81 00 38 8e 04 b5 << Received data (30 bytes) 06 00 ff 07 00 00 00 00 00 00 00 00 00 10 20 1c c4 81 00 38 00 01 84 04 03 00 00 00 00 bb >> SENDING AN OPEN SESSION REQUEST >> sending packet (48 bytes) 06 00 ff 07 06 10 00 00 00 00 00 00 00 00 20 00 00 00 00 00 a4 a3 a2 a0 00 00 00 08 01 00 00 00 01 00 00 08 01 00 00 00 02 00 00 08 01 00 00 00 << Received data (52 bytes) 06 00 ff 07 06 11 00 00 00 00 00 00 00 00 24 00 00 00 05 00 a4 a3 a2 a0 0e 00 00 00 00 00 00 08 01 00 00 00 01 00 00 08 01 00 00 00 02 00 00 08 01 00 00 00 <<OPEN SESSION RESPONSE << Message tag : 0x00 << RMCP+ status : no errors << Maximum privilege level : oem << Console Session ID : 0xa0a2a3a4 << BMC Session ID : 0x0000000e << Negotiated authenticatin algorithm : hmac_sha1 << Negotiated integrity algorithm : hmac_sha1_96 << Negotiated encryption algorithm : aes_cbc_128 >> Console generated random number (16 bytes) d3 86 af 79 be a3 50 7b a8 17 7f bf 97 b8 d7 17 >> SENDING A RAKP 1 MESSAGE >> sending packet (49 bytes) 06 00 ff 07 06 12 00 00 00 00 00 00 00 00 21 00 00 00 00 00 0e 00 00 00 d3 86 af 79 be a3 50 7b a8 17 7f bf 97 b8 d7 17 14 00 00 05 41 44 4d 49 4e << Received data (76 bytes) 06 00 ff 07 06 13 00 00 00 00 00 00 00 00 3c 00 00 00 00 00 a4 a3 a2 a0 d8 7d b5 b8 15 e6 b9 06 b4 4a 21 6e 83 b7 21 76 02 30 48 ff fe 9c eb 49 08 09 0a 0b 0c 0d 0e 0f f6 87 56 79 6c 19 39 0a ee 65 c3 a3 14 d4 9b 4d 1a ee 36 cd <<RAKP 2 MESSAGE << Message tag : 0x00 << RMCP+ status : no errors << Console Session ID : 0xa0a2a3a4 << BMC random number : 0xd87db5b815e6b906b44a216e83b72176 << BMC GUID : 0x023048fffe9ceb4908090a0b0c0d0e0f << Key exchange auth code [sha1] : 0xf68756796c19390aee65c3a314d49b4d1aee36cd session integrity key input (39 bytes) d3 86 af 79 be a3 50 7b a8 17 7f bf 97 b8 d7 17 d8 7d b5 b8 15 e6 b9 06 b4 4a 21 6e 83 b7 21 76 14 05 41 44 4d 49 4e Generated session integrity key (20 bytes) 3d 2c f6 03 de 04 6f b2 f6 ef 11 c2 d0 d7 2a 98 03 bf a2 ee Generated K1 (20 bytes) 3f f4 34 89 01 35 b7 bb d3 3d 63 a5 95 b8 e7 51 f5 fc 13 db Generated K2 (20 bytes) 1c d2 28 e6 db c5 61 f9 d0 f4 47 c6 db ee 5e 3a 21 6d 15 35 >> SENDING A RAKP 3 MESSAGE >> sending packet (44 bytes) 06 00 ff 07 06 14 00 00 00 00 00 00 00 00 1c 00 00 00 00 00 0e 00 00 00 9b 7f ba 0e 8f 21 b9 cb 20 1c 1b fb 31 de 6a a0 f8 c3 fc ea << Received data (36 bytes) 06 00 ff 07 06 15 00 00 00 00 00 00 00 00 14 00 00 00 00 00 a4 a3 a2 a0 4c 00 5a 92 75 d9 7c 65 f4 8f 4c 74 <<RAKP 4 MESSAGE << Message tag : 0x00 << RMCP+ status : no errors << Console Session ID : 0xa0a2a3a4 << Key exchange auth code [sha1] : 0x4c005a9275d97c65f48f4c74 IPMIv2 / RMCP+ SESSION OPENED SUCCESSFULLY >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x3b >> data : 0x04 >> sending packet (64 bytes) 06 00 ff 07 06 c0 0e 00 00 00 03 00 00 00 20 00 9f 67 75 77 f0 66 89 56 82 01 a8 0c 1d a4 87 60 be 27 33 fa 76 93 41 54 3d cf 3d e0 ee 06 5d 3e ff ff 02 07 a0 10 64 1a 00 45 b1 a0 e6 d7 4c bc << Received data (64 bytes) 06 00 ff 07 06 c0 a4 a3 a2 a0 01 00 00 00 20 00 d8 7d b5 b8 15 e6 b9 06 b4 4a 21 6e 83 b7 21 76 16 64 f3 14 2b 20 41 90 ad 44 f0 b2 b9 2b a1 61 ff ff 02 07 21 cf 49 cc ca 07 ad ad d2 c8 e2 87 Decrypted 16 encrypted bytesDecrypted this data (16 bytes) 20 1c c4 81 04 3b 00 04 3c 01 02 03 04 05 06 06 Set Session Privilege Level to ADMINISTRATOR >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x48 >> data : 0x01 0x01 0xc6 0x00 0x00 0x00 >> sending packet (64 bytes) 06 00 ff 07 06 c0 0e 00 00 00 04 00 00 00 20 00 86 8e 57 3c 3c 27 03 70 16 70 38 aa 2f 85 50 d7 d0 90 4e 8b 6f 7e 51 68 e3 62 d0 0e 16 03 9b 20 ff ff 02 07 37 29 9b 26 4e 9f 9f ee 63 c5 cc f3 << Received data (80 bytes) 06 00 ff 07 06 c0 a4 a3 a2 a0 02 00 00 00 30 00 d8 7d b5 b8 15 e6 b9 06 b4 4a 21 6e 83 b7 21 76 e4 79 ea 9b 1a 0d fd e3 fd cf 67 b0 b4 ae 7f 2e 09 17 5b 86 40 04 f8 cc 23 3b a4 ae f8 c0 be a7 ff ff 02 07 db c9 f4 10 ff 61 6d e0 69 d6 3c c4 Decrypted 32 encrypted bytesDecrypted this data (32 bytes) 20 1c c4 81 08 48 ff 00 00 00 00 00 00 00 00 00 00 ff ff 32 01 02 03 04 05 06 07 08 09 0a 0b 0b Error activating SOL payload: Unspecified error >> Sending IPMI command payload >> netfn : 0x06 >> command : 0x3c >> data : 0x0e 0x00 0x00 0x00 >> sending packet (64 bytes) 06 00 ff 07 06 c0 0e 00 00 00 05 00 00 00 20 00 39 00 69 5d ae a5 94 0e 65 56 64 dc ae 64 7b ed 39 b2 ec cc 87 56 cb f9 52 40 1a ff 24 6c 1f d6 ff ff 02 07 5f 03 47 3c 82 74 b4 f9 77 f4 e4 cc << Received data (64 bytes) 06 00 ff 07 06 c0 a4 a3 a2 a0 03 00 00 00 20 00 d8 7d b5 b8 15 e6 b9 06 b4 4a 21 6e 83 b7 21 76 dc 5e 47 46 bf 51 a4 0e 98 7d 06 d6 b3 87 f9 80 ff ff 02 07 b1 69 53 e9 78 15 2d 08 a7 08 74 ed Decrypted 16 encrypted bytesDecrypted this data (16 bytes) 20 1c c4 81 0c 3c 00 37 01 02 03 04 05 06 07 07 Closed Session 0000000e The IPMI card is using verion 1.59 of the firmware. Any of you have any thoughts on this? Thanks in advanced. Mike Lovell m...@mozy.com ------------------------------------------------------------------------------ This SF.net email is sponsored by: SourcForge Community SourceForge wants to tell your story. http://p.sf.net/sfu/sf-spreadtheword _______________________________________________ Ipmitool-devel mailing list Ipmitool-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/ipmitool-devel